Using tVolution Mini, a portable secure desktop
tVolution Mini is Becrypt’s answer to the increased threats associated with remote working. It is a smart thin client solution that comes in the form of an extremely …
Cloud Storage Security, A Practical Guide
Authors: Aaron Wheeler and Michael WinburnPages: 144 pagesPublisher: ElsevierISBN: 0128029307 Introduction Practically everybody keeps at least some of their data in the …
NowSecure Lab cloud: Mobile app assessment environment
NowSecure was one of the companies that caught my attention at this year’s RSA Conference in San Francisco. While it initially seemed like a new player in the field, the …
Penetration Testing With Raspberry Pi
Authors: Joseph Muniz, Aamir LakhaniPages: 142 pagesPublisher: Packt PublishingISBN: 1784396435 Introduction Raspberry Pi is a small and portable single board computer that …
Scany: Network scanner for iOS
Over the past five years I tested quite a few iOS applications that could be used for providing quick snaps of the local network. Most of them were free applications and very …
Tresorit for Business
In the cloud computing era, companies need to be proactive on secure collaboration and file sharing. Tresorit for Business is a solution that, among other things, helps …
Review: Build A Security Culture
Author: Kai Roer Pages: 124 Publisher: IT Governance Publishing ISBN: 1849287163 Introduction Kai Roer is one of the creators of the Security Culture Toolkit, a well-regarded …
Information Security Analytics
Authors: Mark Talabis, Robert McPherson, I. Miyamoto, Jason Martin Pages: 182 Publisher: Syngress ISBN: 0128002077 Introduction We’ve all heard about Big Data and …
Detecting and Combating Malicious Email
Authors: Julie JCH Ryan and Cade Kamachi Pages: 94 Publisher: Syngress ISBN: 0128001100 Introduction After years and years of security professionals explaining the dangers of …
Python Forensics
Author: Chet Hosmer Pages: 352 Publisher: Syngress ISBN: 0124186769 Introduction This book was touted as a “no-nonsense resource for the rapid development of new …
CSA Guide to Cloud Computing
Authors: Raj Samani, Brian Honan, Jim Reavis Pages: 236 Publisher: Syngress ISBN: 0124201253 Introduction The title says it all: this is a book that will tell you what cloud …
Secure file storage and sharing with nCrypted Cloud
The Ponemon Institute recently published a report stressing the fact that organisational leadership is failing to respond to the escalating risk of ungoverned file sharing …
Featured news
Sponsored
Don't miss
- Most people still rely on memory or pen and paper for password management
- What AI can tell organizations about their M&A risk
- Breaking down the numbers: Cybersecurity funding activity recap
- Applying DevSecOps principles to machine learning workloads
- Overcoming GenAI challenges in healthcare cybersecurity